Cyber Operations

Results: 233



#Item
121Mass surveillance / National Security Agency / United States government secrecy / United States Cyber Command / Central Intelligence Agency / United States Intelligence Community / William B. Black /  Jr. / Australian Intelligence Community / United States Department of Defense / National security / Military

William P. Marshall Managing Director Areas of Focus:  Cyber security and Information Assurance  General intelligence community matters  Information Operations and Computer Network Operations

Add to Reading List

Source URL: www.chertoffgroup.com

Language: English - Date: 2014-01-24 09:00:09
122United States Navy / Military organization / Military / United States Department of Defense / United States Tenth Fleet / OPNAV Instruction / United States Cyber Command

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC[removed]Canc frp:

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-09-08 18:08:45
123Military / Electronic warfare / Hacking / Military technology / United States Cyber Command / United States Strategic Command / Cyberwarfare / Defense Information Systems Agency / Joint Task Force-Global Network Operations / Military organization / Military science / Net-centric

GAO Logo (Black_white-w_stroke)cover

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2011-09-29 08:37:00
124

Continuity of Operations (COOP) Resilient Accord Cyber Security Planning (L-553) ​ This course is based on the guidance to the Federal Executive Branch departments and agencies for developing Continuity of Operations (

Add to Reading List

Source URL: www.publicsafety.utah.gov

- Date: 2014-06-12 19:24:44
    125International law / Collateral damage / Cyberwarfare / Civilian casualties / Enemy combatant / Legitimate military target / Coercion / International humanitarian law / Civilian / Laws of war / War / Law

    CHAPTER 22 International Law and Information Operations Thomas C. Wingfield FUTURE WARS will feature information operations with novel weapons, techniques, and targets. Such information operations and cyber attacks will

    Add to Reading List

    Source URL: ctnsp.dodlive.mil

    Language: English - Date: 2014-03-31 15:05:04
    126War / Military intelligence / Hacking / Military technology / Information operations / Information warfare / Cyberterrorism / Military strategy / Air Force Cyber Command / Cyberwarfare / Military science / Electronic warfare

    CHAPTER 20 Nation-State Cyber Strategies: Examples from China and Russia Timothy L. Thomas AN EARLY adopter of cyberspace concepts in the United States was the Air Force, which established a cyberspace command in Novembe

    Add to Reading List

    Source URL: ctnsp.dodlive.mil

    Language: English - Date: 2014-03-31 15:05:01
    127Public safety / Military science / United States Coast Guard / United States Computer Emergency Readiness Team / United States Cyber Command / National Cyber Security Division / Cyber-security regulation / Cyberwarfare / Military organization / United States Department of Homeland Security

    ALIEN MIGRANT INTERDICTION OPERATIONS

    Add to Reading List

    Source URL: www.uscg.mil

    Language: English - Date: 2013-03-21 14:54:14
    128Management / Computer security / National security / Data security / PricewaterhouseCoopers / Information security / Michael Chertoff / Risk / Accenture / Security / Actuarial science / Public safety

    Dr. Alastair MacWillson Principal Areas of Focus: Technology Strategy, Forecasting and Transformation Cyber Security Management and Cyber Threat Assessment Security Strategy, Management and Operations

    Add to Reading List

    Source URL: www.chertoffgroup.com

    Language: English - Date: 2014-06-08 22:04:23
    129Military / War / Laws of war / Hacking / Military technology / United States Cyber Command / Distinction / Military necessity / Cyber Operations / Military science / Electronic warfare / Cyberwarfare

    U.S. Army (Austin Berner) Unpacking Cyberwar The Sufficiency of the Law of Armed Conflict in the Cyber Domain By K y l e G e n a r o P h i ll i ps

    Add to Reading List

    Source URL: ndupress.ndu.edu

    Language: English - Date: 2014-08-28 11:33:51
    130Computer security / Electronic warfare / Computer network operations / Hacking / Military technology / CNO / Threat / Attack / Cyber Operations / Computer network security / Cyberwarfare / Security

    Microsoft Word - 05Sep_Patterson_Smith.doc

    Add to Reading List

    Source URL: www.au.af.mil

    Language: English - Date: 2012-01-04 10:28:59
    UPDATE